Recovery phrase is a list of words randomly generated by your crypto wallet (e.g. MetaMask) during initial account setup.

Recovery Phrase

Recovery phrase is a list of words randomly generated by your crypto wallet (e.g. MetaMask) during initial account setup. Technically, it represents your private key in a human-readable format, facilitating you to write it down and remember. Once you lose your password, you will need a recovery phrase as a backup to access your wallet.

Under what circumstances will recovery phrase be compromised?

The most common case is phishing scam. There were netizens receiving phishing SMS impersonating crypto asset platform, stating that the recipient’s account will be suspended. The recipient is requested to click a hyperlink which redirects to a fraudulent website and to enter the recovery phrase. The hacker can then hijack and transfer virtual assets (e.g. Ether, USDT, NFT paintings) in the wallet using the user’s recovery phrase.

Another situation is via compromised mobile phone or computer. A hacker can hijack a user’ accounts and transfer assets using recovery phrase. Recovery phrase cannot be changed. If you suspect your recovery phrase has been compromised, you should transfer your assets to another wallet immediately.

How to safeguard your crypto asset wallet?

You may be interested in

NFT is a new form of virtual asset investment. Common NFT includes digital image, audio-visual file and video clip which…

How to set up a Firewall A firewall helps defend against cyber attacks and data breaches through shielding computer or…

Cyber Security and Technology Crime Bureau, initiated a new wave of cyber hygiene operation to improve online security, maintain system…

Free Wi-Fi is provided in public places such as government public facilities, shopping malls Free Public Wi-Fi Free Wi-Fi is…

Social media and instant messaging software have become essential tools for our daily social interaction Security of Social Media Account…

If you want to protect your computer facilities and smart devices from cyber threats, please download relevant tools via the…

In late 2020, a virtual private network service provider published a list of passwords which took the shortest time Is…

Welcome to subscribe

Please read our “Privacy Policy” carefully before filling out the form. For enquiries, please email to [email protected]

We, Cyber Defender, collect your personal information including name, gender, and contact information (e.g. telephone number(s) and email address) only for the latest information-sharing proposal

* Must declare

Sign up for web hosting today!

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Subscribe successfully.
Please check your email.